2026 Q1 Report: AI-based Attacks are Rising and Putting Enterprises at Risk

CVE-2026-24858

FortiCloud SSO Under Attack: Understanding the CVE-2026-24858 Authentication Bypass

CVSS Gauge
CVSS Needle

Summary

CVE-2026-24858 is a critical Fortinet authentication bypass. Attackers with a FortiCloud account and a registered device can access other customers’ devices when SSO is enabled. The flaw stems from improper SSO isolation and has been exploited to create admin accounts and access configurations. Patches are available, and SSO is now restricted to fixed versions—immediate upgrades and log checks are needed.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-24858?

Technical Overview

How Does the CVE-2026-24858 Exploit Work?

The attack typically follows these steps:

CVE-2026-24858

What Causes CVE-2026-24858?

Vulnerability Root Cause:

This vulnerability stems from weak isolation in FortiCloud SSO. When enabled, certain Fortinet products may accept SSO authentication from one account on devices belonging to other accounts, allowing attackers to bypass authorization and access devices without proper credentials.

How Can You Mitigate CVE-2026-24858?

If immediate patching is delayed or not possible:

  • Disable FortiCloud Single Sign-On (SSO) on affected devices by turning off the “Allow administrative login using FortiCloud SSO” option in system settings or via CLI.
  • Restrict administrative access to trusted management networks and limit exposure of management interfaces.
  • Review administrator accounts and remove any unauthorized or suspicious local admin users created after SSO login events.
  • Examine device logs for unexpected FortiCloud SSO authentication activity, especially followed by configuration downloads or account creation.
  • Treat any confirmed indicators of unauthorized SSO access as a potential compromise and follow incident response procedures.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-24858 Cause Downtime?

Patch application impact: Low. Applying Fortinet’s patch may cause brief management downtime.

How Can You Detect CVE-2026-24858 Exploitation?

Remediation & Response

Compliance & Governance Notes

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity, reflecting high impact and active exploitation in the wild
Attack Vector NetworkCan be exploited remotely via FortiCloud SSO without local access
Attack ComplexityLowNo special conditions required beyond having a FortiCloud account and a registered device
Privileges RequiredNoneExploitation does not require any credentials from the target device
User InteractionNoneExploitation does not require any action by the target user
ScopeUnChangedImpact is limited to the vulnerable Fortinet devices where SSO is enabled
Confidentiality ImpactHighAttackers can access other users’ devices and download configurations, exposing sensitive data
Integrity ImpactHighAttackers can create local admin accounts, modify configurations, and maintain persistence
Availability ImpactHighExploitation can compromise device operations, potentially affecting service availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.